Static task
static1
Behavioral task
behavioral1
Sample
48e7754bd9cfda22ec40f0bd0294a43209771bbfb825f0525af1d3d4516e7ac2.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
48e7754bd9cfda22ec40f0bd0294a43209771bbfb825f0525af1d3d4516e7ac2.exe
Resource
win10v2004-20230915-en
General
-
Target
48e7754bd9cfda22ec40f0bd0294a43209771bbfb825f0525af1d3d4516e7ac2
-
Size
6.0MB
-
MD5
914cac730245efb8e4035d147fa5eeb8
-
SHA1
8b1729c0eebfc220c7639b086080f8aa30945c6b
-
SHA256
48e7754bd9cfda22ec40f0bd0294a43209771bbfb825f0525af1d3d4516e7ac2
-
SHA512
87d2816c14e67116639180adfeff1aec2a0bc202c136b4c9fe4463eb0b4fd9510dd09e1093ffa1368ba96c7dcf993a1fe8f1c1573a0fbaa86b6b2ef09e9ffa6f
-
SSDEEP
49152:9afqZ5flQVyn5XAsAsPb4zixUGSO6zKqrR87WnzGw9FqM+LtaRIRVS2TTgK8I/bO:bnBO+LqPxByQxB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48e7754bd9cfda22ec40f0bd0294a43209771bbfb825f0525af1d3d4516e7ac2
Files
-
48e7754bd9cfda22ec40f0bd0294a43209771bbfb825f0525af1d3d4516e7ac2.exe windows:6 windows x64
bacd8be82e1fa578083ebacd61c019a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
RegOpenKeyExW
RegQueryValueExW
OpenProcessToken
GetTokenInformation
IsValidSid
GetLengthSid
CopySid
RegCloseKey
LookupAccountSidW
psapi
GetModuleFileNameExW
GetPerformanceInfo
powrprof
CallNtPowerInformation
ntdll
RtlLookupFunctionEntry
NtReadFile
RtlCaptureContext
NtCreateFile
RtlVirtualUnwind
NtDeviceIoControlFile
RtlNtStatusToDosError
NtCancelIoFileEx
NtQuerySystemInformation
RtlGetVersion
NtQueryInformationProcess
NtWriteFile
kernel32
SetNamedPipeHandleState
TryAcquireSRWLockExclusive
SleepConditionVariableSRW
GetLogicalDrives
DeviceIoControl
GetDiskFreeSpaceExW
CreateFileW
GetVolumeInformationW
GetDriveTypeW
GetCurrentProcessId
ReadProcessMemory
VirtualQueryEx
LocalFree
GetExitCodeProcess
GetProcessIoCounters
GetProcessTimes
OpenProcess
HeapAlloc
GetLastError
HeapFree
GetProcessHeap
RegisterWaitForSingleObject
K32EnumProcesses
GetVersionExA
GlobalMemoryStatusEx
GetSystemTimes
ReleaseSRWLockShared
AcquireSRWLockShared
UnregisterWaitEx
GetCurrentProcess
DuplicateHandle
GetSystemInfo
GetProcAddress
GetModuleHandleA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
CloseHandle
GetCurrentThreadId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetHandleInformation
SetUnhandledExceptionFilter
GetTickCount64
GetTempPathW
GetSystemTimeAsFileTime
TlsSetValue
TlsGetValue
CreateThread
ReadConsoleW
WideCharToMultiByte
IsProcessorFeaturePresent
WriteConsoleW
CreateIoCompletionPort
CancelIoEx
ReadFile
GetOverlappedResult
PostQueuedCompletionStatus
WriteFile
GetQueuedCompletionStatusEx
MultiByteToWideChar
GetFileAttributesW
SetFileCompletionNotificationModes
Sleep
GetStdHandle
GetConsoleMode
SetConsoleMode
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
FillConsoleOutputCharacterA
FillConsoleOutputAttribute
GetFileInformationByHandleEx
MoveFileExW
CreateProcessW
GetWindowsDirectoryW
GetSystemDirectoryW
FreeEnvironmentStringsW
ReleaseMutex
FindClose
CompareStringOrdinal
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
GetCurrentThread
SetLastError
GetCurrentDirectoryW
GetEnvironmentStringsW
GetEnvironmentVariableW
WaitForMultipleObjects
GetCommandLineW
SetFileInformationByHandle
WriteFileEx
SleepEx
ReadFileEx
WaitForSingleObject
TerminateProcess
WakeAllConditionVariable
WakeConditionVariable
QueryPerformanceCounter
QueryPerformanceFrequency
CreateNamedPipeW
HeapReAlloc
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
FindNextFileW
GetFileInformationByHandle
CreateDirectoryW
FindFirstFileW
DeleteFileW
GetFinalPathNameByHandleW
CopyFileExW
CreateEventW
CancelIo
GetFullPathNameW
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
ExitProcess
ws2_32
ioctlsocket
getsockopt
connect
bind
shutdown
getpeername
getsockname
recv
send
WSASend
closesocket
setsockopt
WSAGetLastError
WSAStartup
WSACleanup
freeaddrinfo
WSASocketW
getaddrinfo
WSAIoctl
user32
GetSystemMetrics
pdh
PdhOpenQueryA
PdhGetFormattedCounterValue
PdhAddEnglishCounterW
PdhCloseQuery
PdhCollectQueryData
PdhRemoveCounter
shell32
CommandLineToArgvW
netapi32
NetUserGetInfo
NetUserGetLocalGroups
NetUserEnum
NetApiBufferFree
secur32
LsaGetLogonSessionData
LsaEnumerateLogonSessions
FreeCredentialsHandle
QueryContextAttributesW
DeleteSecurityContext
LsaFreeReturnBuffer
DecryptMessage
FreeContextBuffer
AcceptSecurityContext
InitializeSecurityContextW
EncryptMessage
AcquireCredentialsHandleA
ApplyControlToken
iphlpapi
GetIfTable2
GetAdaptersAddresses
FreeMibTable
GetIfEntry2
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
CoUninitialize
oleaut32
SysFreeString
VariantClear
SysAllocString
crypt32
CertVerifyCertificateChainPolicy
CertCloseStore
CertOpenStore
CertGetCertificateChain
CertEnumCertificatesInStore
CertFreeCertificateChain
CertDuplicateCertificateChain
CertDuplicateCertificateContext
CertFreeCertificateContext
CertAddCertificateContextToStore
CertDuplicateStore
vcruntime140
__C_specific_handler
__current_exception
__CxxFrameHandler3
memcpy
memset
memmove
memcmp
__current_exception_context
_CxxThrowException
api-ms-win-crt-heap-l1-1-0
_set_new_mode
free
malloc
api-ms-win-crt-stdio-l1-1-0
__stdio_common_vsprintf
__p__commode
_set_fmode
api-ms-win-crt-string-l1-1-0
wcslen
strncpy
strlen
api-ms-win-crt-math-l1-1-0
round
truncf
ceil
trunc
__setusermatherr
pow
api-ms-win-crt-runtime-l1-1-0
_set_app_type
_seh_filter_exe
_crt_atexit
_register_onexit_function
_register_thread_local_exe_atexit_callback
_initialize_onexit_table
_configure_narrow_argv
_cexit
terminate
_c_exit
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_initterm_e
exit
_exit
__p___argv
__p___argc
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
Sections
.text Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.8MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ